Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
966a35cf0125a7c8e91d3aabc08fa276_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
966a35cf0125a7c8e91d3aabc08fa276_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
966a35cf0125a7c8e91d3aabc08fa276_JaffaCakes118.html
-
Size
37KB
-
MD5
966a35cf0125a7c8e91d3aabc08fa276
-
SHA1
765eaa5b8ed15659da4d62b10d3fa75da11ac5ba
-
SHA256
b0e39bd1138235206c2f4af16892000b054493fd9a4775e5fe5ceb32e3123bbb
-
SHA512
7eeeea9ed2b0494c6bc24c93cffe8c0ec9b7f582ed8e85234c60a01d977cd5628430786ac308f25002fa5e0a80db3340cfc20fe85ec91e3098704b02f475668a
-
SSDEEP
192:uw7ab5nKenQjxn5Q/dnQieANn5nQOkEntXDnQTbnxnQOg/cwqY+cwqYicwqYQuKy:BQ/ofOY5uKMlmsF7n/iy
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B38C07A1-22BE-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423700663" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2064 iexplore.exe 2064 iexplore.exe 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE 2148 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28 PID 2064 wrote to memory of 2148 2064 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\966a35cf0125a7c8e91d3aabc08fa276_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9a298bc62627e5e42c92ecbe50f354
SHA1524f285eb72d8c29cb273cceab0e3b1866c6bbae
SHA25677b0abb387baf775aa444b364602803b0cc1b89bbd73986ad3101bd2bf929ee0
SHA5125dd4247e06e942bc31670f99a500f511928553b7f719e344423953cd58ab77e4074ed0a375e09444a0124882936dc1ae854dcf1acd3396a31b23b444597e76bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5445aa3db0d59f3ca3242410e3b8f5106
SHA1b749383e4bc03f75bc8a43d802e2d577dfe1f37d
SHA256369b9e612ef1bb4d9503b74033199f2dc77e3f1d857f3ed02edaba90e8094d56
SHA512337832de4e2988bb5d911877caacd82733639ab5d93b0f6ed843837bcc2a8612812a3f6fb03278176bca0de8d3386e749df1cb925656a01ca8e0fc40e4051743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50643c245484fb9146201eb30ff5fe906
SHA19afc48d37873341fd770c28a56e920b3cff732cb
SHA256e6eaa6dd83b7be1a5c8d97152ba4ce00b0ab1a41bfd58a7a2a8e0ad2e43aa91f
SHA512f3893cc50e66d42ee5d7065a3939fe2efdb4c1f9ec219a7008451c0d10bc24d8d16e2254936cdd309b2a72e0ae398f0e4003d83b0a578d7c0e9ae7f79fb24e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c18f711f7160b3672fb35d4f1f2484
SHA1af5920cc1e6985b7b44c66fe307d4d39f1660e45
SHA2567850317d1c318aecab69453e3155f9b46b9286de361403e51d02271e4727728d
SHA512b07f999b5f0295924f87200709920f318d1fe99ef7342f37f198e0b57fef432729455b27467d5ad21b33899f3db1d705b8153c3d7d754c04e42bb7b2a3a1c6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508466def455fdb0274d3929ea5726d5d
SHA147db7cb13df7e579c4123c8c5257b7fb06bc2873
SHA2560c84b888e1e4af665d69a5a9a2dba37861923e7784c6bc2c9c9de89e3adaee51
SHA512d677aa7131c08b40bdcb499b4bc9356fcd6666382d9510f676d2c97b8ee850dfe102c94c5f3f8756d7b8ffe5c4cc938fce4b8fef1785997461045d790ae65d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55900b1f585914b07da362fc851a69649
SHA15b28b296fcb35945ab6f7ae3ee36bb6bccd2a77a
SHA25674e76bdd942e0b564d8d425ce1cbe962e7cc8562b6f9cf1c34ff409579a777f4
SHA512b9ad4cd8ef0e85cd55ffc4f728baa3332d5269eadc41518e3ace35351e81cdd5803b3457e90aaadfaebb4769b7b9da78cfc420f91cf5dd894b40bd21c10f8f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1e0782d625d0b239f97867ad3aa963e
SHA114b822331fa287a1aa0120f92700bb079c619a78
SHA2561be157e376232253c2fdd04625813b648d4819d04552cb04bdb264aceb13baae
SHA512773c69a4017274d1612e5df6c8c68e3ddf9bbe998f61df657f037d0b548c93f87bdbcdf8aba0e2a2a970974fc5ddfeb8b1bc65da6e3185c2c62e46f7cb55e69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55393c29aca80a2f8ccc63988bdfd4fbb
SHA1a503df4e7c65724f2c3a61810e31b02e3d1ff660
SHA256a386348eafb416c34863ed0fae82d20a844bee9d0ac26b886cbc17cdd299d461
SHA5121fe67a3120c6a5d4798f9f7bf9159c243b65f81ba9e55e8c5200fe11930ed4cffe202e0f8576332bd9cbf07d0eadc8465417b5030d74ec20c1a594860948b6c5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b